Cybersecurity and Networks

Master of Science

Put yourself at the intersection of informational technology and computer science. The hands-on exploration of information technology. The foundational theory of computer science. Cross the two and you’ll be at the exact spot where some of the most dynamic and challenging careers are to be found today.

Successful Career Paths

Our Cybersecurity and Networks program prepares you for these careers with a combination of practical skills and cutting-edge knowledge, leading you to success as an Information Security Analyst, Digital Forensic Examiner, Network Engineer, or System Administrator — to name just a few of your possible career titles.

No Programming or IT Background? No Problem.

There are two versions to the program. One version is for those who already hold a bachelor’s degree in computer science or a closely related field, while the other is for those with no prior education in these areas. Those coming to the program without this education simply complete a set of four additional bridge courses on the topics of programming and computer systems. These will help you transition from your previous background to a level of readiness that enables you to successfully pursue the rest of the degree program.

Choose Your Electives — Choose Your Career Path

Thanks to an ever-evolving set of electives, you can focus on the area that most attracts you. These are the areas that currently show high demand in the field of Cybersecurity and Networks:

Cyber forensics — recovering evidence to support a criminal investigation

Cybersecurity — protecting a computing infrastructure in the face of continual security threats

Wireless networking — investigating the properties of the next generation of wireless infrastructures

A Serious Project Prepares You for the Real World of Cybersecurity and Networks

You will complete a substantial project that will demonstrate your level of expertise and professionalism so that you can hit the ground running when you land that coveted position in your chosen area. There are three ways to satisfy the project requirement: a thesis for which research would be done; taking a course in which a significant project occurs; or taking a separate course specifically dedicated to a project.

Learn from professors who are dedicated to your success.

Nationally Recognized Center for Career Development

All University of New Haven students have access to the many resources available through the University’s Career Development Center, which has been named one of the best in the nation by The Princeton Review.

From career assessments, networking, and job shadowing to on-campus interviews and salary negotiation, the Career Development Center provides the skills and connections to identify a meaningful career and an opportunity to pursue your passion.

Innovative Courses

A survey of cryptographic concepts and algorithms and their application to data security. Techniques studied include private key cryptosystems, public key cryptosystems, and hash functions. Commonly used algorithms will also be studied, including DES, 3DES, IDEA, RSA, Diffie-Hellman, MD5, SHA, and DSS. Other algroithms examined will be those used to provide confidentiality, message authentication, key exchange, and digital signatures in applications such as client-server authentication, email security, and web security.

The theoretical and practical foundations necessary for the investigation of small scale digital devices (SSDDs). SSDDs include mobile phones, smartphones, tablets and BlackBerry, and any device that could potentially fit in your pocket, and their respective operating systems such as Android and iOS. Topics include: bagging and tagging SSDDs, logical and physical acquisition of SSDDs, analysis of SSDDs, authentication of SSDD evidence, evidence reconstruction, the various operating systems on SSDDs, SSDD ontology, and application artifacts found on SSDDs.

Fundamentals of administration of a machine running versions of Microsoft Windows and its integration in a heterogeneous network. Topics include file system layouts and backups, user and group management using Active Directory, network services such as DNS, DHCP, file sharing, printing, email including Exchange server, ftp and web services using IIS, databases, and general security issues including protection through security suites and intrusion detection systems. Integration with Unix systems using Samba, Services For Unix and virtual machines. Students will set up a network of machines using these principles.

Concepts and details of writing small programs in Python for the Unix and Window-Server operating systems. Security issues in shell scripts, batch file programming, Python scripts, and C programming. Students will write scripts to control network system resources.

The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Masters of Science in Cybersecurity and Networks, check out the Academic Catalog:

Learn More In Person

March 19 - 23, 2018

Next Steps

An advanced degree from the University of New Haven will help you take your career to the next level. Each program offers convenient scheduling, personalized attention, and state-of-the-art facilities.